Sciweavers

186 search results - page 2 / 38
» Secure Association Rule Sharing
Sort
View
DGO
2007
150views Education» more  DGO 2007»
13 years 7 months ago
Event-triggered data and knowledge sharing among collaborating government organizations
Solving complex global problems such as illegal immigration, border control, and terrorism requires government organizations at all levels to share not only data but, more importa...
Seema Degwekar, Jeff DePree, Howard W. Beck, Carla...
ICDM
2009
IEEE
124views Data Mining» more  ICDM 2009»
14 years 13 days ago
On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining
—The recent interest in outsourcing IT services onto the cloud raises two main concerns: security and cost. One task that could be outsourced is data mining. In VLDB 2007, Wong e...
Ian Molloy, Ninghui Li, Tiancheng Li
VLDB
2007
ACM
111views Database» more  VLDB 2007»
13 years 12 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
VLDB
1995
ACM
195views Database» more  VLDB 1995»
13 years 9 months ago
Discovery of Multiple-Level Association Rules from Large Databases
Previous studies on mining association rules find rules at single concept level, however, mining association rules at multiple concept levels may lead to the discovery of more spe...
Jiawei Han, Yongjian Fu
WPES
2004
ACM
13 years 11 months ago
A quantitative and qualitative ANALYSIS of blocking in association rule hiding
Emmanuel D. Pontikakis, Yannis Theodoridis, Achill...